ENTERPRISE LINUX HIGH AVAILABILITY CLUSTERING Training in Aurora

Enroll in or hire us to teach our ENTERPRISE LINUX HIGH AVAILABILITY CLUSTERING class in Aurora, Illinois by calling us @303.377.6176. Like all HSG classes, ENTERPRISE LINUX HIGH AVAILABILITY CLUSTERING may be offered either onsite or via instructor led virtual training. Consider looking at our public training schedule to see if it is scheduled: Public Training Classes
Provided there are enough attendees, ENTERPRISE LINUX HIGH AVAILABILITY CLUSTERING may be taught at one of our local training facilities.
We offer private customized training for groups of 3 or more attendees.

Course Description

 
An in-depth course that focuses on two key areas, Linux high availability (HA) clustering and HA storage administration. Storage is integral to many HA clusters so as to make use of clustered storage technologies to enable active/active configurations. Over the course of many in-depth lab exercises, each student will assemble a realistic three-node Linux cluster utilizing best practices. Each node has three network interfaces and each student's cluster has its own dedicated cluster VLAN. The class contains a storage array for shared LUNs among the nodes. This enables students to perform very real world tasks in a real world setting, including multipathing, redundant ring communication, last man standing cluster, and shared storage scenarios. Course topics include: Cluster Architecture & Design, Pacemaker, Corosync, Fencing, Resource Management, Advanced Resource Management, Multipathing, Cluster LVM, Global File System v2. The unprecedented real-world nature of this class requires a classroom configuration that would be daunting (but not impossible) to put together in a physical or virtual classroom. The Guru Labs online classroom solution, RLabs, instantly and easily deploys a classroom with the exact configuration needed to support this class. Students will be able to focus on the course topics rather than configuration settings outside the scope of the course.
Course Length: 4 Days
Course Tuition: $2590 (US)

Prerequisites

This course requires an advanced knowledge of Linux system administration. These skills are taught in the "Enterprise Linux Systems Administration" and "Linux Fundamentals".

Course Outline

 
  1. INTRODUCTION TO CLUSTERING AND STORAGE MANAGEMENT
    1. Clustering Introduction
    2. Cluster Building Blocks
    3. Shared Storage
    4. Hardware and Software Requirements
    5. Network Considerations
    6. Split Brain Prevention with Fencing
    7. HA Components
    8. Clustered Resources
    9. Configuration Tools
    10. Red Hat Cluster Stack Roadmap
    11. Running Commands on Multiple Systems
    LAB TASKS
    1. Running Commands on Multiple Hosts
    2. Prepare System for Clustering
    3. Static Network Configuration
  2. COROSYNC AND QUORUM MANAGEMENT
    1. Vocabulary
    2. Network Topology
    3. Ethernet Bonding
    4. Communication Methods
    5. IPv6 Considerations
    6. Cluster Node Preparation
    7. Enable and Configure pcsd
    8. PCS & PCSD
    9. Cluster Quorum
    10. Advanced Quorum Techniques
    11. Corosync
    12. Corosync - Redundant Ring Protocol (RRP)
    13. Corosync Security
    14. Joining and Leaving the Cluster
    15. Quorum Administration
    16. Upgrading
    LAB TASKS
    1. Install Cluster Components
    2. Setup a Two Node Cluster
    3. Setup a Three Node Cluster with PCS
    4. Totem RRP
    5. PCS GUI
  3. STONITH AND FENCING
    1. Fencing Introduction
    2. Node Level Fencing
    3. Node Fencing: External
    4. Node Fencing: Internal
    5. Node Fencing: Pseudo
    6. Resource Level Fencing
    7. Fencing Architecture
    8. STONITH Subsystem
    9. Fencing Agents
    10. Fencing Agents listing
    11. STONITH Resources
    12. Working With stonith_admin
    13. Manual Fencing
    14. Best Practices
    LAB TASKS
    1. Suicide Fencing with Storage Based Death
    2. Fencing with fence_scsi
  4. PACEMAKER CLUSTER RESOURCE MANAGER
    1. Cluster Architecture Revisited
    2. Pacemaker Architecture
    3. Pacemaker Cluster Information Base (CIB)
    4. Resource Management Overview
    5. Component Relationships
    6. Resource Agents
    7. Types of Resources
    8. Resource Naming Conventions
    9. Resource Specific Parameters/Options
    10. Resource Meta Parameters/Options
    11. Resource Agent Operations
    12. Discover Resource Agents
    13. Available Resource Agents
    14. Resource Spotlight: IPAddr2
    15. Add a Primative Resource
    16. Resource Group Management
    17. Resource Group Example
    18. Resource Actions: Monitoring
    19. Resource Administration
    20. PCS vs. CRM_*
    LAB TASKS
    1. Simple Management with PCS-GUI
    2. Using Resource Groups
  5. ADVANCED RESOURCE CONFIGURATION
    1. Resource Placement Basics
    2. Resource Ordering
    3. Location Constraints
    4. Relocating Resources
    5. Relocation on Failure
    6. Resource Standard: Clones & Multi-State
    7. Resource Operations
    8. Troubleshooting
    9. Cluster Maintenance
    LAB TASKS
    1. Setup a Web Farm
    2. Using Constraints
    3. Cluster Monitoring
  6. STORAGE TECHNOLOGIES
    1. Remote Storage Overview
    2. Remote Filesystem Protocols
    3. Remote Block Device Protocols
    4. Distributed Lock Manager
    5. dlm_controld & dlm_tool
    6. Block Devices and the Device Mapper
    7. Managing Loopback Devices
    LAB TASKS
    1. Manipulating Block Devices
  7. ISCSI
    1. iSCSI Architecture
    2. iSCSI Target Implementations
    3. iSCSI Target Node Preparation & targetcli
    4. iSCSI Target Administration
    5. iSCSI Target Defining Storage Objects
    6. iSCSI Target LUN Administration
    7. iSCSI Target Network Portal Configuration
    8. iSCSI Target Security
    9. iSCSI Target Examples
    10. Open-iSCSI Initiator Implementation
    11. iSCSI Initiator Discovery
    12. iSCSI Initiator Node Administration
    13. Mounting iSCSI Targets at Boot
    14. iSCSI Multipathing Considerations
    LAB TASKS
    1. iSCSI Initiator Configuration
  8. KERNEL DEVICE MANAGEMENT
    1. Managing Linux Device Files
    2. Kernel Hardware Info – /sys/
    3. /sys/ Structure
    4. udev
    5. I/O Elevators
    LAB TASKS
    1. Creating Custom UDEV Rules
  9. DEVICE MAPPER AND MULTIPATHING
    1. SAN Multipathing
    2. Multipath Configuration
    3. Multipathing Best Practices
    LAB TASKS
    1. Multipath Configuration
  10. ADVANCED LVM & CLUSTER LVM
    1. Logical Volume Management
    2. Implementing LVM
    3. Creating Logical Volumes
    4. Activating LVM VGs
    5. Exporting and Importing a VG
    6. Examining LVM Components
    7. Changing LVM Components
    8. Advanced LVM Overview
    9. Advanced LVM: Components & Object Tags
    10. Advanced LVM: Automated Storage Tiering
    11. Advanced LVM: Thin Provisioning
    12. Advanced LVM: Striping & Mirroring
    13. Advanced LVM: RAID Volumes
    14. cLVM
    LAB TASKS
    1. Creating and Managing LVM Volumes
    2. cLVM
  11. GLOBAL FILE SYSTEM (GFS) 2
    1. GFS2 Overview
    2. GFS2 Capabilities
    3. GFS2 Theory of Operation
    4. GFS2 Configuration Prerequisites
    5. Setting Up Cluster LVM
    6. GFS2 Filesystem Creation & Mounting
    7. GFS2 Filesystem Management
    8. GFS2 Fencing Requirement
    LAB TASKS
    1. GFS2

Course Directory [training on all levels]

Upcoming Classes
Gain insight and ideas from students with different perspectives and experiences.

Linux Unix Uses & Stats

Linux Unix is Used For:
Desktop Mainframe Computers Mobile Devices Embedded Devices
Difficulty
Popularity
Year Created
1991/1971
Pros
Performance:
Linux supports many efficient tools and operates them seamlessly. Because it's architecture is lightweight it runs faster than both Windows 8.1 and 10. 
 
Security:
Because Linux is an open-source software,  anyone can contribute code to help enhance the users’ experience i.e., adding features, fixing bugs, reducing security risks, and more.
 
 
Software Development:
The terminal in Linux is a *wild card*. You can do almost anything with it. This includes software installation, application and server configurations, file system management, and etc.
 
Large-scale:
Open-source projects benefit from having an attentive community. As a result, Linux is more secure than Windows. Instead of installing anti viruses to clean malware, you just have to stick to the recommended repositories. 
 
Efficient: 
Developers have the convenience of running servers, training machine learning models, accessing remote machines, and compiling and running scripts from the same terminal window. 
 
Free: 
Linux is free (you can put it on as many systems as you like) and you can change it to suit your needs.
Cons
Learning Curve: 
Linux is not for everyone, there is a learning curve in switching to Ubuntu. To actually learn Linux efficiently would take a user one to several years.
 
No Tech Support:
Unlike Windows, there isn’t a dedicated tech support, so getting help for things is up to you. 
 
Designer Compatabilty:
Linux is not as user friendly as Windows or as ‘straight out of the box design’ As an example for design choices, Adobe hasn’t released any of its products to Linux users. So it’s impossible to run them directly. The Ubuntu alternative is a free software called GIMP. 
 
Gaming Capabilities: 
Most games aren’t available in Linux. But that’s not to say you can’t make it happen, it's just not as easy.   
Linux Unix Job Market
Average Salary
$85k-$105k
Job Count
n/a
Top Job Locations

New York City
Boston
San Francisco 

Complimentary Skills to have along with Linux Unix
The following are types of jobs that may require Linux skills.  The top 15 job titles on Dice.com that mention Linux in their postings are:
- DevOps Engineer
- Software Engineer
- Java Developer
- Systems Engineer
- Systems Administrator
- Senior Software Engineer
- Network Engineer
- Python Developer
- Linux Systems Administrator
- Software Developer
- System Administrator
- Linux Administrator
- Linux Engineer
- Senior Java Developer
- C++ Developer

Interesting Reads Take a class with us and receive a book of your choosing for 50% off MSRP.